Microservices Anomaly Detection

Kubernetes Runtime Protection : Alert, Detect, Enforce

The Alcide platform provides a threat detection engine and offers protection against attacks that are either overlooked or undetected by traditional protection layers, including abnormal behaviors and security incidents such as DNS exfiltration, spoofing, poisoning, and lateral movement. While security features like micro-segmentation and cloud-provider security groups limit the allowed network connections between potentially interacting applications’ workloads, they cannot stop the abuse of the permitted connections by external attackers, internally deployed malware or malicious insiders.

New blog: Pod Security Policy

The Pod Security Policy is part of Kubernetes admission control mechanism, so in order to have the Pod Security Policy take effect, the Kubernetes Admission Control needs to be activated. When the User or the Service Account access the Kubernetes API for creating a Pod, the Admission Control is invoked and checks if the Pod attributes conform with the rules defined in the Pod Security Policy. In case there is a mismatch the API server will fail the operation.

Webinar on-demand

Kubernetes Network Security - Going Beyond Network Policies

eBook

A Practical Guide to working with Kubernetes

Alcide secures Kubernetes multi-cluster deployments from code-to-production. Companies use Alcide to scale their Kubernetes deployments without compromising on security. This enables the smooth operation of business apps while protecting cloud deployments from malicious attacks.